EMAIL DOCTORING / FORGERY

Hello - a bit of help please and a pointer in the right direction if possible.

My compnay is a membership body and I have uncovered a case whereby an email has been submitted to us which has been added to - more names added - and then printed and saved in numerous files. It is a clear case of an email having been tampered with, amended, so as to falsify numbers. Can anybody please tell me the relevant laws, acts that cover this behaviour.

Answer Wiki

If you are looking for a way to prosecute an individual, your organization should retain a lawyer who knows the law.

You can type in “forgery law” into any search engine to fine out what laws exist but you would also want to see those which apply to your state/country as well.

Good luck.

>>>

I am not a lawyer but I believe the act of modifying an email would fall within the legal definition of “spoliation”. One must consider the intent of the spoliator and the subsequent damage caused by the act of spoliation. For example, was it the persons intent to commit a fraud or damage the reputation of the organization? The next question is, did they succeed and what was the level of damage (monetary or reputational) caused by the act?

Prior to retaining a lawyer which will likely be a very expensive proposition, you should determine how serious this act should be taken. If you decide to proceed with either a civil or criminal suit, you should immediately apply standard computer forensic practices in order to preserve the original email and any variants because they will be “discoverable” in any action you choose to bring.

I have found that Kroll Ontrack is a great resource for case law and electronic discovery guidance related to technology legal proceedings.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States.
Privacy

Processing your response...

Discuss This Question: 5 &nbspReplies

There was an error processing your information. Please try again later.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States.
Privacy

the only thing i could think that this thing has happened, it either the system wasnt secured or someone planted a keylogger on your computer and another thing the password was weak, going back to your problem get a lawyer who knows the law regarding that kind situation and the thing it depends on your country also whether a law been passed on it regarding that kind of cases.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States.
Privacy

Processing your reply...

Ask a Question

Free Guide: Managing storage for virtual environments

Complete a brief survey to get a complimentary 70-page whitepaper featuring the best methods and solutions for your virtual environment, as well as hypervisor-specific management advice from TechTarget experts. Don’t miss out on this exclusive content!

To follow this tag...

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States.
Privacy